Auto Update 2024/07/17 06:30:02

This commit is contained in:
motikan2010-bot 2024-07-17 15:30:02 +09:00
parent db2d31c30b
commit 76dd489852
59 changed files with 309 additions and 204 deletions

View file

@ -18,7 +18,7 @@
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"ssh-server"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 23,
"score": 0,
"subscribers_count": 1

View file

@ -18,7 +18,7 @@
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"ssh-server"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 23,
"score": 0,
"subscribers_count": 1

View file

@ -43,10 +43,10 @@
"description": "A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.",
"fork": false,
"created_at": "2018-02-08T15:52:50Z",
"updated_at": "2023-09-28T10:48:08Z",
"updated_at": "2024-07-17T05:58:12Z",
"pushed_at": "2018-11-23T11:47:10Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -64,7 +64,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 10
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 11,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 8,
"watchers": 16,
"score": 0,
"subscribers_count": 2

File diff suppressed because one or more lines are too long

View file

@ -18,13 +18,13 @@
"stargazers_count": 268,
"watchers_count": 268,
"has_discussions": false,
"forks_count": 82,
"forks_count": 78,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 82,
"forks": 78,
"watchers": 268,
"score": 0,
"subscribers_count": 16
@ -48,13 +48,13 @@
"stargazers_count": 201,
"watchers_count": 201,
"has_discussions": false,
"forks_count": 112,
"forks_count": 106,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 112,
"forks": 106,
"watchers": 201,
"score": 0,
"subscribers_count": 10

View file

@ -13,10 +13,10 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2024-07-04T12:11:42Z",
"updated_at": "2024-07-17T03:49:28Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 323,
"watchers_count": 323,
"stargazers_count": 324,
"watchers_count": 324,
"has_discussions": false,
"forks_count": 108,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 108,
"watchers": 323,
"watchers": 324,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": "Root your MediaTek device with CVE-2020-0069",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2024-05-31T06:20:53Z",
"updated_at": "2024-07-17T02:33:18Z",
"pushed_at": "2023-02-06T19:18:56Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 141,
"watchers_count": 141,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 140,
"watchers": 141,
"score": 0,
"subscribers_count": 11
},
@ -142,10 +142,10 @@
"description": "CVE-2020-0069",
"fork": false,
"created_at": "2023-09-04T17:52:04Z",
"updated_at": "2024-07-15T13:27:07Z",
"updated_at": "2024-07-17T02:41:50Z",
"pushed_at": "2023-09-04T17:53:01Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -154,7 +154,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x",
"fork": false,
"created_at": "2020-12-18T14:39:28Z",
"updated_at": "2024-01-17T15:55:07Z",
"updated_at": "2024-07-17T01:30:36Z",
"pushed_at": "2020-12-18T14:41:09Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 2
}

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-07-11T08:20:20Z",
"updated_at": "2024-07-17T06:04:27Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1279,
"watchers_count": 1279,
"stargazers_count": 1280,
"watchers_count": 1280,
"has_discussions": false,
"forks_count": 164,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 164,
"watchers": 1279,
"watchers": 1280,
"score": 0,
"subscribers_count": 14
}

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-07-16T03:48:15Z",
"updated_at": "2024-07-17T03:45:58Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1556,
"watchers_count": 1556,
"stargazers_count": 1557,
"watchers_count": 1557,
"has_discussions": false,
"forks_count": 481,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 481,
"watchers": 1556,
"watchers": 1557,
"score": 0,
"subscribers_count": 28
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-43798 - Grafana 8.x Path Traversal (Pre-Auth)",
"fork": false,
"created_at": "2021-12-06T20:10:23Z",
"updated_at": "2024-04-25T23:37:12Z",
"updated_at": "2024-07-17T03:04:16Z",
"pushed_at": "2021-12-07T18:09:20Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 2
},
@ -511,10 +511,10 @@
"description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).",
"fork": false,
"created_at": "2021-12-11T18:49:30Z",
"updated_at": "2024-07-08T07:48:33Z",
"updated_at": "2024-07-17T03:01:23Z",
"pushed_at": "2021-12-11T19:10:03Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -523,7 +523,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 3
},

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-07-11T08:20:20Z",
"updated_at": "2024-07-17T06:04:27Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1279,
"watchers_count": 1279,
"stargazers_count": 1280,
"watchers_count": 1280,
"has_discussions": false,
"forks_count": 164,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 164,
"watchers": 1279,
"watchers": 1280,
"score": 0,
"subscribers_count": 14
},

View file

@ -27,6 +27,6 @@
"forks": 4,
"watchers": 16,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-07-11T14:42:21Z",
"updated_at": "2024-07-17T05:38:17Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1141,
"watchers_count": 1141,
"stargazers_count": 1140,
"watchers_count": 1140,
"has_discussions": true,
"forks_count": 189,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 189,
"watchers": 1141,
"watchers": 1140,
"score": 0,
"subscribers_count": 19
},

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,7 +27,7 @@
"forks": 40,
"watchers": 276,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
},
{
"id": 538041124,

View file

@ -30,7 +30,7 @@
"forks": 33,
"watchers": 237,
"score": 0,
"subscribers_count": 7
"subscribers_count": 6
},
{
"id": 820964383,

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-07-28T03:09:00Z",
"updated_at": "2024-07-09T17:22:52Z",
"updated_at": "2024-07-17T03:14:46Z",
"pushed_at": "2023-08-09T01:37:19Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -167,8 +167,8 @@
"description": "An authenticated RCE exploit for Dolibarr ERP\/CRM CVE-2023-30253.",
"fork": false,
"created_at": "2024-07-10T05:39:01Z",
"updated_at": "2024-07-15T01:13:05Z",
"pushed_at": "2024-07-15T01:13:02Z",
"updated_at": "2024-07-17T01:01:38Z",
"pushed_at": "2024-07-17T01:01:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

32
2023/CVE-2023-30800.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 829859872,
"name": "CVE-2023-30800_PoC",
"full_name": "griffinsectio\/CVE-2023-30800_PoC",
"owner": {
"login": "griffinsectio",
"id": 49835583,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49835583?v=4",
"html_url": "https:\/\/github.com\/griffinsectio"
},
"html_url": "https:\/\/github.com\/griffinsectio\/CVE-2023-30800_PoC",
"description": "Proof of concept for CVE-2023-30800",
"fork": false,
"created_at": "2024-07-17T06:24:41Z",
"updated_at": "2024-07-17T06:26:45Z",
"pushed_at": "2024-07-17T06:26:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -2,14 +2,14 @@
{
"id": 797293097,
"name": "py_trustwallet_wasm",
"full_name": "oooooorest\/py_trustwallet_wasm",
"full_name": "ohexa\/py_trustwallet_wasm",
"owner": {
"login": "oooooorest",
"login": "ohexa",
"id": 121653522,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121653522?v=4",
"html_url": "https:\/\/github.com\/oooooorest"
"html_url": "https:\/\/github.com\/ohexa"
},
"html_url": "https:\/\/github.com\/oooooorest\/py_trustwallet_wasm",
"html_url": "https:\/\/github.com\/ohexa\/py_trustwallet_wasm",
"description": "(CVE-2023-31290) Trust Wallet Core before 3.1.1, as used in the Trust Wallet browser extension before 0.0.183, allows theft of funds because the entropy is 32 bits, as exploited in the wild in December 2022 and March 2023.",
"fork": false,
"created_at": "2024-05-07T15:02:22Z",

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -124,5 +124,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 829763833,
"name": "CVE-2023-38408",
"full_name": "mrtacojr\/CVE-2023-38408",
"owner": {
"login": "mrtacojr",
"id": 90226620,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90226620?v=4",
"html_url": "https:\/\/github.com\/mrtacojr"
},
"html_url": "https:\/\/github.com\/mrtacojr\/CVE-2023-38408",
"description": "Script para eliminar vulnerabilidad de openssh de ubuntu 22.04 LTS ",
"fork": false,
"created_at": "2024-07-17T02:00:31Z",
"updated_at": "2024-07-17T02:02:19Z",
"pushed_at": "2024-07-17T02:02:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1428,6 +1428,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-15T12:14:18Z",
"updated_at": "2024-07-13T00:53:26Z",
"updated_at": "2024-07-17T01:33:49Z",
"pushed_at": "2024-03-08T12:57:53Z",
"stargazers_count": 190,
"watchers_count": 190,
"stargazers_count": 191,
"watchers_count": 191,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 190,
"watchers": 191,
"score": 0,
"subscribers_count": 10
},

View file

@ -692,7 +692,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 792301008,

View file

@ -84,13 +84,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -27,7 +27,7 @@
"forks": 9,
"watchers": 48,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 816799428,
@ -43,10 +43,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-07-15T21:00:09Z",
"updated_at": "2024-07-17T06:24:33Z",
"pushed_at": "2024-06-19T12:24:50Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 157,
"watchers_count": 157,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -55,9 +55,9 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 154,
"watchers": 157,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 823594837,

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-07-16T13:51:35Z",
"updated_at": "2024-07-17T03:49:10Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2183,
"watchers_count": 2183,
"stargazers_count": 2184,
"watchers_count": 2184,
"has_discussions": false,
"forks_count": 284,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 284,
"watchers": 2183,
"watchers": 2184,
"score": 0,
"subscribers_count": 23
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 29,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"screenconnect"
],
"visibility": "public",
"forks": 29,
"forks": 28,
"watchers": 93,
"score": 0,
"subscribers_count": 4

View file

@ -34,7 +34,7 @@
"forks": 9,
"watchers": 29,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 827123627,
@ -80,12 +80,12 @@
"description": "PoC - Authenticated Remote Code Execution in VMware vCenter Server (CVE-2024-22274 Exploit))",
"fork": false,
"created_at": "2024-07-15T07:26:59Z",
"updated_at": "2024-07-17T00:22:13Z",
"updated_at": "2024-07-17T06:03:52Z",
"pushed_at": "2024-07-16T23:22:14Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -102,8 +102,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 3,
"watchers": 11,
"forks": 4,
"watchers": 17,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-07-16T12:42:00Z",
"updated_at": "2024-07-17T06:06:46Z",
"pushed_at": "2024-07-04T10:39:15Z",
"stargazers_count": 274,
"watchers_count": 274,
"stargazers_count": 275,
"watchers_count": 275,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 274,
"watchers": 275,
"score": 0,
"subscribers_count": 3
},
@ -43,10 +43,10 @@
"description": "Windows LPE",
"fork": false,
"created_at": "2024-06-11T08:03:29Z",
"updated_at": "2024-07-11T01:24:06Z",
"updated_at": "2024-07-17T06:09:15Z",
"pushed_at": "2024-06-11T20:41:59Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 66,
"watchers": 67,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "macOS\/ XNU kernel buffer overflow. Introduced in macOS 14.0 (xnu-10002.1.13), fixed in macOS 14.5 (xnu-10063.121.3)",
"fork": false,
"created_at": "2024-06-19T22:03:02Z",
"updated_at": "2024-07-06T16:24:21Z",
"updated_at": "2024-07-17T01:53:39Z",
"pushed_at": "2024-06-20T17:23:22Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 25,
"watchers": 27,
"score": 0,
"subscribers_count": 1
}

View file

@ -373,10 +373,10 @@
"description": "Perform with massive Wordpress SQLI 2 RCE",
"fork": false,
"created_at": "2024-07-11T14:17:23Z",
"updated_at": "2024-07-14T02:48:20Z",
"updated_at": "2024-07-17T04:06:37Z",
"pushed_at": "2024-07-11T14:20:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -385,7 +385,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -74,7 +74,7 @@
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-07-16T09:20:39Z",
"pushed_at": "2024-06-17T08:10:13Z",
"pushed_at": "2024-07-17T04:25:37Z",
"stargazers_count": 314,
"watchers_count": 314,
"has_discussions": false,

View file

@ -27,7 +27,7 @@
"forks": 42,
"watchers": 172,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 820782545,
@ -103,10 +103,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-07-16T23:43:10Z",
"updated_at": "2024-07-17T04:57:33Z",
"pushed_at": "2024-07-15T09:13:48Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 167,
"watchers_count": 167,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 160,
"watchers": 167,
"score": 0,
"subscribers_count": 3
}

View file

@ -18,7 +18,7 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -32,9 +32,9 @@
"vm-escape"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-13T05:16:21Z",
"updated_at": "2024-05-20T10:41:38Z",
"updated_at": "2024-07-17T05:56:50Z",
"pushed_at": "2024-04-13T05:20:15Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
@ -403,10 +403,10 @@
"description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect",
"fork": false,
"created_at": "2024-04-16T21:24:15Z",
"updated_at": "2024-07-12T01:21:04Z",
"updated_at": "2024-07-17T05:56:48Z",
"pushed_at": "2024-04-17T11:03:32Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -415,7 +415,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 2
},

View file

@ -78,13 +78,13 @@
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 22,
"score": 0,
"subscribers_count": 2
@ -177,7 +177,7 @@
"forks": 7,
"watchers": 24,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 822233085,
@ -460,7 +460,7 @@
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 828292663,
@ -492,7 +492,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 828468155,

View file

@ -18,13 +18,13 @@
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 28,
"score": 0,
"subscribers_count": 1
@ -197,23 +197,23 @@
"html_url": "https:\/\/github.com\/MInggongK"
},
"html_url": "https:\/\/github.com\/MInggongK\/geoserver-",
"description": "geoserver CVE-2024-36401 一键漏洞利用工具",
"description": "geoserver CVE-2024-36401漏洞利用工具",
"fork": false,
"created_at": "2024-07-16T17:29:39Z",
"updated_at": "2024-07-16T18:39:51Z",
"pushed_at": "2024-07-16T18:39:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-07-17T03:30:35Z",
"pushed_at": "2024-07-17T03:21:24Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
}
]

View file

@ -18,16 +18,16 @@
"stargazers_count": 90,
"watchers_count": 90,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 90,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 824792553,

View file

@ -27,7 +27,7 @@
"forks": 13,
"watchers": 31,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 825258239,

32
2024/CVE-2024-40119.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 829794758,
"name": "nepstech-xpon-router-CVE-2024-40119",
"full_name": "sudo-subho\/nepstech-xpon-router-CVE-2024-40119",
"owner": {
"login": "sudo-subho",
"id": 77957540,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77957540?v=4",
"html_url": "https:\/\/github.com\/sudo-subho"
},
"html_url": "https:\/\/github.com\/sudo-subho\/nepstech-xpon-router-CVE-2024-40119",
"description": "Cross-Site Request Forgery (CSRF) vulnerability in the password change function, which allows remote attackers to change the admin password without the user's consent, leading to a potential account takeover.",
"fork": false,
"created_at": "2024-07-17T03:03:42Z",
"updated_at": "2024-07-17T03:10:19Z",
"pushed_at": "2024-07-17T03:10:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -133,10 +133,10 @@
"description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support",
"fork": false,
"created_at": "2024-04-25T19:51:38Z",
"updated_at": "2024-07-15T15:03:44Z",
"updated_at": "2024-07-17T02:31:06Z",
"pushed_at": "2024-07-07T23:47:58Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -160,7 +160,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 51,
"watchers": 50,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 64,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-07-14T04:09:12Z",
"updated_at": "2024-07-17T02:26:15Z",
"pushed_at": "2024-06-07T03:28:00Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 82,
"watchers": 83,
"score": 0,
"subscribers_count": 2
},
@ -179,10 +179,10 @@
"description": "PDF.js是由Mozilla维护的基于JavaScript的PDF查看器。此漏洞允许攻击者在打开恶意 PDF 文件后立即执行任意 JavaScript 代码。这会影响所有 Firefox 用户 <126因为 Firefox 使用 PDF.js 来显示 PDF 文件,但也严重影响了许多基于 Web 和 Electron 的应用程序,这些应用程序(间接)使用 PDF.js 进行预览功能。",
"fork": false,
"created_at": "2024-06-13T15:14:47Z",
"updated_at": "2024-07-05T02:59:51Z",
"updated_at": "2024-07-17T02:25:35Z",
"pushed_at": "2024-06-13T15:19:57Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -191,7 +191,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -1234,19 +1234,19 @@
"description": "PoC - PHP CGI Argument Injection CVE-2024-4577 (Scanner and Exploitation)",
"fork": false,
"created_at": "2024-07-06T19:37:14Z",
"updated_at": "2024-07-12T03:48:36Z",
"updated_at": "2024-07-17T00:53:05Z",
"pushed_at": "2024-07-07T15:32:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow",
"fork": false,
"created_at": "2024-07-12T10:32:37Z",
"updated_at": "2024-07-15T16:58:38Z",
"updated_at": "2024-07-17T01:34:17Z",
"pushed_at": "2024-07-13T10:46:32Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
@ -177,6 +177,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,19 +13,19 @@
"description": "a signal handler race condition in OpenSSH's server (sshd)",
"fork": false,
"created_at": "2024-07-01T10:55:29Z",
"updated_at": "2024-07-16T20:50:48Z",
"updated_at": "2024-07-17T03:23:00Z",
"pushed_at": "2024-07-01T10:54:02Z",
"stargazers_count": 426,
"watchers_count": 426,
"stargazers_count": 427,
"watchers_count": 427,
"has_discussions": false,
"forks_count": 179,
"forks_count": 180,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 179,
"watchers": 426,
"forks": 180,
"watchers": 427,
"score": 0,
"subscribers_count": 5
},
@ -48,16 +48,16 @@
"stargazers_count": 375,
"watchers_count": 375,
"has_discussions": false,
"forks_count": 85,
"forks_count": 86,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 85,
"forks": 86,
"watchers": 375,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
},
{
"id": 822584501,
@ -78,7 +78,7 @@
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 38,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -91,7 +91,7 @@
"ssh"
],
"visibility": "public",
"forks": 38,
"forks": 39,
"watchers": 98,
"score": 0,
"subscribers_count": 4
@ -301,7 +301,7 @@
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -313,7 +313,7 @@
"ssh-server"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 23,
"score": 0,
"subscribers_count": 1
@ -346,7 +346,7 @@
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 822856797,
@ -1438,7 +1438,7 @@
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1453,7 +1453,7 @@
"rce"
],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 36,
"score": 0,
"subscribers_count": 1
@ -2263,10 +2263,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-07-12T16:51:22Z",
"updated_at": "2024-07-17T05:46:20Z",
"pushed_at": "2024-07-08T20:03:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -2275,7 +2275,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -3537,6 +3537,9 @@
- [truonghuuphuc/CVE-2024-39943-Poc](https://github.com/truonghuuphuc/CVE-2024-39943-Poc)
- [A-little-dragon/CVE-2024-39943-Exploit](https://github.com/A-little-dragon/CVE-2024-39943-Exploit)
### CVE-2024-40119
- [sudo-subho/nepstech-xpon-router-CVE-2024-40119](https://github.com/sudo-subho/nepstech-xpon-router-CVE-2024-40119)
### CVE-2024-40492
- [minendie/POC_CVE-2024-40492](https://github.com/minendie/POC_CVE-2024-40492)
@ -7024,6 +7027,13 @@
- [Alucard0x1/CVE-2023-30777](https://github.com/Alucard0x1/CVE-2023-30777)
### CVE-2023-30800 (2023-09-07)
<code>The web server used by MikroTik RouterOS version 6 is affected by a heap memory corruption issue. A remote and unauthenticated attacker can corrupt the server's heap memory by sending a crafted HTTP request. As a result, the web interface crashes and is immediately restarted. The issue was fixed in RouterOS 6.49.10 stable. RouterOS version 7 is not affected.\n
</code>
- [griffinsectio/CVE-2023-30800_PoC](https://github.com/griffinsectio/CVE-2023-30800_PoC)
### CVE-2023-30839 (2023-04-25)
<code>PrestaShop is an Open Source e-commerce web application. Versions prior to 8.0.4 and 1.7.8.9 contain a SQL filtering vulnerability. A BO user can write, update, and delete in the database, even without having specific rights. PrestaShop 8.0.4 and 1.7.8.9 contain a patch for this issue. There are no known workarounds.
@ -7069,7 +7079,7 @@
<code>Trust Wallet Core before 3.1.1, as used in the Trust Wallet browser extension before 0.0.183, allows theft of funds because the entropy is 32 bits, as exploited in the wild in December 2022 and March 2023. This occurs because the mt19937 Mersenne Twister takes a single 32-bit value as an input seed, resulting in only four billion possible mnemonics. The affected versions of the browser extension are 0.0.172 through 0.0.182. To steal funds efficiently, an attacker can identify all Ethereum addresses created since the 0.0.172 release, and check whether they are Ethereum addresses that could have been created by this extension. To respond to the risk, affected users need to upgrade the product version and also move funds to a new wallet address.
</code>
- [oooooorest/py_trustwallet_wasm](https://github.com/oooooorest/py_trustwallet_wasm)
- [ohexa/py_trustwallet_wasm](https://github.com/ohexa/py_trustwallet_wasm)
### CVE-2023-31320 (2023-11-14)
@ -8706,6 +8716,7 @@
- [LucasPDiniz/CVE-2023-38408](https://github.com/LucasPDiniz/CVE-2023-38408)
- [classic130/CVE-2023-38408](https://github.com/classic130/CVE-2023-38408)
- [wxrdnx/CVE-2023-38408](https://github.com/wxrdnx/CVE-2023-38408)
- [mrtacojr/CVE-2023-38408](https://github.com/mrtacojr/CVE-2023-38408)
### CVE-2023-38434 (2023-07-18)